Skip to content

350-401 Implementing Cisco Enterprise Network Core Technologies exams demo

QUESTION 3
What is the difference between a RIB and a FIB?
A. The FIB is populated based on RIB content.
B. The RIB maintains a mirror image of the FIB.
C. The RIB is used to make IP source prefix-based switching decisions.
D. The FIB is where all IP routing information is stored.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
What is a requirement for an Ansible-managed node?
A. It must have an SSH server running.
B. It must be a Linux server or a Cisco device.
C. It must support ad hoc commands.
D. It must have an Ansible Tower installed.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
A client device fails to see the enterprise SSID, but other client devices are connected to it.
What is the cause of this issue?
A. The client has incorrect credentials stored for the configured broadcast SSID.
B. The hidden SSID was not manually configured on the client.
C. The broadcast SSID was not manually configured on the client.
D. The client has incorrect credentials stored for the configured hidden SSID.
Correct Answer: B
96CE4376707A97CE80D4B1916F054522
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Which two descriptions of FlexConnect mode for Cisco APs are true? (Choose two.)
A. APs that operate in FlexConnect mode cannot detect rogue APs.
B. When connected to the controller, FlexConnect APs can tunnel traffic back to the controller. C.
FlexConnect mode is used when the APs are set up in a mesh environment and used to bridge between
each other.
C. FlexConnect mode is a feature that is designed to allow specified CAPWAP-enabled APs to exclude
themselves from managing data traffic between clients and infrastructure.
D. FlexConnect mode is a wireless solution for branch office and remote office deployments.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/
cg_flexconnect.html
QUESTION 7
Which OSPF network types are compatible and allow communication through the two peering devices?
A. point-to-multipoint to nonbroadcast
B. broadcast to nonbroadcast
C. point-to-multipoint to broadcast
D. broadcast to point-to-point
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.freeccnaworkbook.com/workbooks/ccna/configuring-ospf-network-types
QUESTION 8
Which NGFW mode blocks flows crossing the firewall?
A. tap
B. inline
C. passive
D. inline tap
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepowerthreat-
defense-int.html
96CE4376707A97CE80D4B1916F054522
QUESTION 9
Which statement about route targets is true when using VRF-Lite?
A. Route targets control the import and export of routes into a customer routing table.
B. When BGP is configured, route targets are transmitted as BGP standard communities.
C. Route targets allow customers to be assigned overlapping addresses.
D. Route targets uniquely identify the customer routing table.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data
centers?
A. uses flexible NetFlow
B. assigns a VLAN to the endpoint
C. classifies traffic based on advanced application recognition
D. classifies traffic based on the contextual identity of the endpoint rather than its IP address
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/
at_a_glance_c45-726831.pdf
.

.

.

.


QUESTION 12
Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving
non-LISP traffic with a LISP site destination?
A. PITR
B. map resolver
C. map server
D. PETR
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DCI/5-0/LISPmobility/
DCI_LISP_Host_Mobility/LISPmobile_2.html
QUESTION 13
Which two protocols are used with YANG data models? (Choose two.)
A. TLS
B. RESTCONF
C. SSH
D. NETCONF
E. HTTPS
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Which HTTP status code is the correct response for a request with an incorrect password applied to a REST
API session?
A. HTTP Status Code: 200
B. HTTP Status Code: 302
C. HTTP Status Code: 401
D. HTTP Status Code: 504
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401

.

.

.
Which statement about multicast RPs is true?
A. RPs are required only when using protocol independent multicast dense mode.
B. RPs are required for protocol independent multicast sparse mode and dense mode.
C. By default, the RP is needed periodically to maintain sessions with sources and receivers.
D. By default, the RP is needed only to start new sessions with sources and receivers.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/rps.html
QUESTION 17
To increase total throughput and redundancy on the links between the wireless controller and switch, the
customer enabled LAG on the wireless controller.
Which EtherChannel mode must be configured on the switch to allow the WLC to connect?
A. Active
B. Passive
C. On
D. Auto
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://community.cisco.com/t5/wireless-mobility-documents/lag-link-aggregation/ta-p/3128669
96CE4376707A97CE80D4B1916F054522
QUESTION 18
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
A. security group tag ACL assigned to each port on a switch
B. security group tag number assigned to each user on a switch
C. security group tag number assigned to each port on a network
D. security group tag ACL assigned to each router on a network
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07-730151-
00_overview_of_trustSec_og.pdf
QUESTION 19
An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN.
Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based
on their OUIs?
A. over the DS
B. 802.11k
C. adaptive R
D. 802.11v
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
.

.

.
QUESTION 21
A network administrator is implementing a routing configuration change and enables routing debugs to track
routing behavior during the change. The logging output on the terminal is interrupting the command typing
process.
Which two actions can the network administrator take to minimize the possibility of typing commands
incorrectly? (Choose two.)
A. Configure the logging synchronous global configuration command.
B. Configure the logging synchronous command under the vty.
C. Increase the number of lines on the screen using the terminal length command.
96CE4376707A97CE80D4B1916F054522
D. Configure the logging delimiter feature.
E. Press the TAB key to reprint the command in a new line.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Which two pieces of information are necessary to compute SNR? (Choose two.)
A. transmit power
B. noise floor
C. EIRP
D. RSSI
E. antenna gain
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Reference: https://community.cisco.com/t5/wireless-mobility-documents/snr-rssi-eirp-and-free-space-path-loss/
ta-p/3128478
QUESTION 23
Which statements are used for error handling in Python?
A. try/catch
B. catch/release
C. block/rescue
D. try/except
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose
two.)
A. reduced rack space, power, and cooling requirements
B. smaller Layer 2 domain
C. increased security
D. speedy deployment
E. reduced IP and MAC address requirements
Correct Answer: AD
Section: (none)
Explanation

BUY full version for more questions

Previous article 2V0-41.20 Professional VMware NSX-T Data Center exams demo
Next article 312-50v11 Certified Ethical Hacker v11 Exams demo

Leave a comment

* Required fields